Advertisement

Authenticated Queries in Sensor Networks

  • Zinaida Benenson
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3813)

Abstract

This work-in-progress report investigates the problem of authenticated querying in sensor networks. Roughly, this means that whenever the sensor nodes process a query, they should be able to verify that the query was originated by a legitimate entity. I precisely define authenticated querying, analyze the design space for realizing it and propose solutions to this problem in presence of node capture attacks.

Keywords

Sensor Network Sensor Node Wireless Sensor Network Design Space Query Processing 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Benenson, Z., Gedicke, N., Raivio, O.: Realizing robust user authentication in sensor networks. In: Real-World Wireless Sensor Networks (REALWSN), Stockholm (June 2005)Google Scholar
  2. 2.
    Benenson, Z., Gärtner, F.C., Kesdogan, D.: An algorithmic framework for robust access control in wireless sensor networks. In: Second European Workshop on Wireless Sensor Networks (EWSN) (January 2005)Google Scholar
  3. 3.
    Boneh, D., Durfee, G., Franklin, M.K.: Lower bounds for multicast message authentication. In: Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques, pp. 437–452. Springer, Heidelberg (2001)Google Scholar
  4. 4.
    Canetti, R., Garay, J., Itkis, G., Micciancio, D., Naor, M., Pinkas, B.: Multicast security: A taxonomy and some efficient constructions. In: Proc. IEEE INFOCOM 1999, New York, NY, March 1999, vol. 2, pp. 708–716. IEEE, Los Alamitos (1999)Google Scholar
  5. 5.
  6. 6.
    Deng, J., Han, R., Mishra, S.: Security support for in-network processing in wireless sensor networks. In: SASN 2003: Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks, New York, NY, USA, pp. 83–93. ACM Press, New York (2003)CrossRefGoogle Scholar
  7. 7.
    Dimitriou, T., Foteinakis, D.: Secure and efficient in-network processing for sensor networks. In: First Workshop on Broadband Advanced Sensor Networks, BaseNets (2004)Google Scholar
  8. 8.
    Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM conference on Computer and communications security, pp. 41–47. ACM Press, New York (2002)CrossRefGoogle Scholar
  9. 9.
    Gaubatz, G., Kaps, J.-P., Sunar, B.: Public key cryptography in sensor networks - revisited. In: Castelluccia, C., Hartenstein, H., Paar, C., Westhoff, D. (eds.) ESAS 2004. LNCS, vol. 3313, pp. 2–18. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  10. 10.
    Gupta, V., Millard, M., Fung, S., Zhu, Y., Gura, N., Eberle, H., Shantz, S.C.: Sizzle: A standards-based end-to-end security architecture for the embedded internet. In: Third IEEE International Conference on Pervasive Computing and Communication (PerCom 2005), Kauai (March 2005)Google Scholar
  11. 11.
    Gura, N., Patel, A., Wander, A., Eberle, H., Shantz, S.C.: Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 119–132. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  12. 12.
    Intanagonwiwat, C., Govindan, R., Estrin, D., Heidemann, J., Silva, F.: Directed Diffusion for wireless sensor networking. IEEE/ACM Trans. Netw. 11(1), 2–16 (2003)CrossRefGoogle Scholar
  13. 13.
    Levis, P., Madden, S., Gay, D., Polastre, J., Szewczyk, R., Woo, A., Brewer, E., Culler, D.: The emergence of networking abstractions and techniques in tinyos. In: First USENIX/ACM Symposium on Networked Systems Design and Implementation (2004)Google Scholar
  14. 14.
    Madden, S., Franklin, M.J., Hellerstein, J.M., Hong, W.: The design of an acquisitional query processor for sensor networks. In: SIGMOD 2003: Proceedings of the 2003 ACM SIGMOD international conference on Management of data, pp. 491–502. ACM Press, New York (2003)CrossRefGoogle Scholar
  15. 15.
    Malan, D.J., Welsh, M., Smith, M.D.: A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography. In: First IEEE International Conference on Sensor and Ad Hoc Communications and Network, Santa Clara, California (October 2004)Google Scholar
  16. 16.
    Menezes, A.J., Oorschot, P.C.V., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)zbMATHGoogle Scholar
  17. 17.
    Moteiv, Inc. Tmote Sky datasheet, Available at http://www.moteiv.com/products/docs/tmote-sky-datasheet.pdf
  18. 18.
    Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.D.: SPINS: security protocols for sensor netowrks. In: Proceedings of the 7th annual international conference on Mobile computing and networking, pp. 189–199. ACM Press, New York (2001)CrossRefGoogle Scholar
  19. 19.
    Pietro, R.D., Mancini, L.V., Law, Y.W., Etalle, S., Havinga, P.J.M.: LKHW: A Directed Diffusion-Based Secure Multicast Scheme for Wireless Sensor Networks. In: 32nd International Conference on Parallel Processing Workshops (ICPP 2003 Workshops) (2003)Google Scholar
  20. 20.
    Przydatek, B., Song, D., Perrig, A.: SIA: Secure information aggregation in sensor networks. In: ACM SenSys 2003 (November 2003)Google Scholar
  21. 21.
    Seys, S., Preneel, B.: Efficient cooperative signatures: A novel authentication scheme for sensor networks. In: Hutter, D., Ullmann, M. (eds.) SPC 2005. LNCS, vol. 3450, pp. 86–100. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  22. 22.
    Vogt, H.: Exploring message authentication in sensor networks. In: Castelluccia, C., Hartenstein, H., Paar, C., Westhoff, D. (eds.) ESAS 2004. LNCS, vol. 3313, pp. 19–30. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  23. 23.
    Wagner, D.: Resilient aggregation in sensor networks. In: SASN 2004: Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks, pp. 78–87. ACM Press, New York (2004)CrossRefGoogle Scholar
  24. 24.
    Wang, X., Yang, L., Chen, K.: Sdd: Secure distributed diffusion protocol for sensor networks. In: Castelluccia, C., Hartenstein, H., Paar, C., Westhoff, D. (eds.) ESAS 2004. LNCS, vol. 3313, pp. 205–214. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  25. 25.
    Watro, R., Kong, D., fen Cuti, S., Gardiner, C., Lynn, C., Kruus, P.: TinyPK: securing sensor networks with public key technology. In: Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks, pp. 59–64. ACM Press, New York (2004)CrossRefGoogle Scholar
  26. 26.
    Woo, A., Madden, S., Govindan, R.: Networking support for query processing in sensor networks. Commun. ACM 47(6), 47–52 (2004)CrossRefGoogle Scholar
  27. 27.
    Yao, Y., Gehrke, J.: The cougar approach to in-network query processing in sensor networks. SIGMOD Rec. 31(3), 9–18 (2002)CrossRefGoogle Scholar
  28. 28.
    Ye, F., Luo, H., Lu, S., Zhang, L.: Statistical en-route detection and filtering of injected false data in sensor networks. In: Proceedings of IEEE INFOCOM (2004)Google Scholar
  29. 29.
    Zhu, S., Setia, S., Jajodia, S.: LEAP: efficient security mechanisms for large-scale distributed sensor networks. In: Proceedings of the 10th ACM conference on Computer and communication security, pp. 62–72. ACM Press, New York (2003)CrossRefGoogle Scholar
  30. 30.
    Zhu, S., Setia, S., Jajodia, S., Ning, P.: An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks. In: IEEE Symposium on Security and Privacy, pp. 259–271 (2004)Google Scholar
  31. 31.
    Zhu, S., Xu, S., Setia, S., Jajodia, S.: Establishing pair-wise keys for secure communication in ad hoc networks: A probabilistic approach. In: IEEE International Conference on Network Protocols (November 2003)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Zinaida Benenson
    • 1
  1. 1.Department of Computer ScienceRWTH Aachen UniversityGermany

Personalised recommendations